
Ian GriggPeer For Peer Foundation
Ian Grigg
BSc(Hons) in Computer Science, UNSW; MBA London Business School
About
26
Publications
45,768
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
755
Citations
Introduction
Social savings groups
Additional affiliations
January 1994 - June 1996
Publications
Publications (26)
Financial Cryptography is substantially complex, requiring skills drawn from diverse and incompatible, or at least, unfriendly, disciplines. Caught between Central Banking and Cryptography, or between accountants and programmers, there is a grave danger that efforts to construct Financial Cryptography systems will simplify or omit critical discipli...
Describing digital value for payment systems is not a trivial task. Simplistic methods of using numbers or country codes to describe currencies, and ticker tape symbols to issue bonds, shares, and other financial instruments soon run into shortcomings in their ability to handle dynamic and divergent demands. The seemingly arbitrary variations in th...
Classical double entry accounting has provided the foundation for accounting within the firm for many centuries. The digitally signed receipt, an innovation from financial cryptography, gives rise to exactly duplicated entries for each of 3 parties or roles, the outcome of which we call triple entry accounting. This presents a challenge to double e...
Most Artificial Intelligence (AI) implementations so far are based on the exploration of how the human brain is designed. Nevertheless, while significant progress is shown on specialized tasks, creating an Artificial General Intelligence (AGI) remains elusive. This manuscript proposes that instead of asking how the brain is constructed, the main qu...
This chapter sets out some critical reflections on the creation of the ‘Ricardian Contract’, the most direct antecedent for the ‘smart legal contract’, and more recent developments in blockchain-based ‘smart contracts’. In the halcyon days of 1995, Ian Grigg looked for a way to capture the nature of financial agreements in order to create an instru...
An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper sel...
In which I apply the Ricardian Contract ideas to solving the problem of too many blockchains, and in the process create a network object design pattern now apparently tagged as The Ricardian Triple, which provides design direction for smart contracts, identity, IoT and chains.
Bitcoin’s inclusion of the smart contract form invented by Nick Szabo has thrust this design into the forefront. An alternate design, the Ricardian Contract designed by the present author, is currently used by a few innovatory systems such as OpenTransactions, OpenBazaar, Askemos and CommonAccord. Mark Miller sees these as two halves of a split con...
The problem of cryptographic numerology has plagued modern cryptography throughout most of its life. The basic concept is that as long as your encryption keys are at least "this big," you're fine, even if none of the surrounding infrastructure benefits from that size or even works at all. The application of cryptographic numerology conveniently dir...
How does a lightweight community Certification Authority ("CA") engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of "wh...
In the security community, weve always recognized that our security proposals come with certain costs in terms of usability. Traditionally, thats the compromise we make to get security. But the market has ruled against us. Time and time again, our fielded secure systems are ignored, bypassed, turned off, or constrained to such a small part of the...
Phishing is an attack on the user and her browser. Addressing phishing necessarily means changing the browser, and this creates tensions between those who lose money - users and ecommerce sites - and those who need to do the work - browser manufacturers.
Mutual funds are vulnerable to abuses involving market timing and late trading. Primarily, this is due to a failure of governance, and the delayed nature of settlement of both payments and transfers. This vulnerability is only exploited over time, through a progression of small steps that, individually, raise no alarm, but in sum, cross the line of...
Financial Cryptography is substantially complex, requiring skills drawn from diverse and incompatible, or at least, unfriendly, disciplines. Caught between Central Banking and Cryptography, or between accountants and programmers, there is a grave danger that efforts to construct Financial Cryptography systems will simplify or omit critical discipli...
The state of Digital Trading on the Internet is surveyed with the assistance of case studies of high-profile service providers. These providers use the Internet for delivery of trading instructions, and IPO data, and some hope to build exchanges based on Internet access. The efficiencies so far demonstrated indicate dramatic structural change. An a...
The Internet was built using the efforts of a worldwide team of programmers that coordinated and competed through laissez-faire methods. Much of the effort was freely provided, or paid for by entities in a process that did not conform to normal commercial revenue-seeking or government regulatory behaviour. This points to major inefficiencies in the...